Sie sind auf Seite 1von 3

Computer Network Security Issues and Countermeasures

Authors: 1)Liu Chunli 2)Liu DongHui


Reference: Computer Network Security Issues and Countermeasures in 2012 IEEE
Symposium on Robotics and Applications (ISRA).
1.Brief Summary: The modern era has witnessed a rapid evolution in the grown of internet
featured via the application of the computer networks Security is an important entity in any
sector and it is inevitable to have proper security in networks. With the increase in security issues
we witness the emergence of computer networks. To tackle these issues, we must come up with
countermeasures. In this paper, we analyze the security and reliability issues existing in
computer networks and propose the counter measures.
2.Background: In computer networks, there are a variety of insecurity factors. We can say that
nowadays, computer technology and network technology has become an integral part of people’s
life. At the same time, various problems have also cropped up. New insecurity factors are
constantly emerging. With the increasingly stronger demand for opening and sharing network
information resources, more and more people start using network resources, and the network size
is constantly expanding. However, hidden insecurity factors are also increasing. Network
security accident is not uncommon any more, and the number of accidents and losses also grow
exponentially. In the network, there are a lot of viruses and hackers damaging network security,
and some deliberate cyber crimes impose huge threats to information security.
3.Overview/Main Points:
Here, we summarize and find out the insecurity factors which mainly lie in the following aspects.

Environment:
Computer network is connected to terminals or computers in different regions through radio
waves or cable links. Terminals or computers are connected with networks to receive
information passed via the networks. In the process of transmission of information, the lines
are inevitably subject to the influence of natural environment and social environment, thus
imposing huge adverse impact on the network. In nature, there are many factors that affect
network security.For example, extreme humidity, temperature, earthquake, anti-dust
conditions, fire, wind and some prominent incidents will all cause serious damage to and
influence on the network in terms of transmission lines on the one hand and the stability of
the network on the other hand.
Resource sharing
Existing network has increasingly high requirements for resource sharing, including
hardware, software and data sharing. Both terminal-terminal and terminal-server resource
sharing is required, so users can quickly access network information even if they are in a
different place, very convenient. However, at the same time, this convenient process also
presents some “opportunities” for some ill-intentioned people and many illegal users may
take advantage of certain loopholes to steal or destroy information. For certain purposes,
some illegal users sometimes may conduct illegal browsing and illegal modification through
the terminal or node, imposing threats to the accuracy of data or information obtained.
Data communication
In computer networks, information transfer and exchange is completed through data
communications. The transmission of information needs physical lines, radio waves and
some electronic equipment for support. Insecurity factors also exist in such basic equipment.
Information in the transmission process is quite vulnerable to damage, such as network line
radiation, wiretapping and so on.
Computer virus
In computer networks, sharing of resources is expected to be achieved as much as possible,
so there are generally a 328 2012 IEEE Symposium on Robotics and Applications(ISRA)
978-1-4673-2207-2/12/$31.00 嘋2012 IEEE number of nodes receiving information. Since
there is no way to guarantee the security, each node is very vulnerable to infection of
computer viruses. Once the virus intrudes a computer, the consequences would be disastrous.
The virus will have rapid regeneration and infection in the network, soon spreading to the
entire network and making all network stages infected. If there is no good emergency
measure, the virus can paralyze the entire network in very short time.
4.Methodology/Approach:
A. Check and promptly repair network security vulnerabilities
Network security vulnerability detection should be carried out frequently by the management
personnel, because it can help them to detect all kinds of insecurity factors and a variety of
network security vulnerabilities for timely detection and timely treatment, so that any
vulnerabilities can be repaired and the results of such repair can be verified promptly.
Vulnerability detection mainly includes three aspects—network vulnerability scanning, system
security scanning and database system security scanning.
B. Make rational use of firewall
All applications of the computer network usually would set a firewall to protect the internal
network from attacks. The so-called firewall refers to the establishment of a security control
point in internal or external network or between any two networks. Any flow of data passing
through the firewall needs to go through testing to decide whether to allow, reject or redirect, so
that all incoming and outgoing network services and visits will be audited and controlled,
information security can be guaranteed, and the internal network can be protected from malicious
attacks as much as possible
C. Implement intrusion detection to prevent hacker attacks Intrusion detection is implemented to
detect malicious and suspicious activities in network, and intercept and prevent them in a timely
manner once discovered to ensure the normal operation of the network. The damage caused by
network intrusion sometimes is unimaginable. Therefore, once network intrusion is detected,
effective measures must be taken immediately to stop it to minimize its consequences. For
example, you can modify the configuration of firewall, host, routers and application systems to
block the attack and on this basis, track and locate the source of attack.
D. Properly use encryption technology
Many network security issues are derived from the database, and may be solved as long as the
issues of the database are solved. Not all threats to the database come from the outside, because
some of the threats are from the inside of the network. Among internal personnel using the
network, some may have evil intentions and illegally steal user names and passwords, which is
also possible. Some internal users may take advantage of their relations to use database beyond
their permission, and sometimes, they can even open database files beyond their authority to
steal or interpolate information. In this case, confidentiality is particularly important. By
encrypting some important data, the security of data stored in the database can naturally be
guaranteed.

5.Conclusion: Computer network security involves square respect area, is a complex system. It
is needed for the upkeep of the multi agent participation, but also to engage the front prevention,
monitoring, and afterwards make up for 3 understaffed, continue to strengthen safety
consciousness, improve safety technology, establishing security policy, thus enhancing the
security of computer network.Computer technology and network technology are widely used in
real life, bringing convenience to people. But it also has its own shortcomings, of which the most
criticized is security issues, requiring key breakthroughs in the efforts to ensure computer
network security. In this article, the author analyzes the reasons for security issues and technical
countermeasures. It is believed that with growing maturity, computer network technology will
bring more and more convenience to people's life and work.